DATACENTER DETECTION AND AUTHENTICATION TECHNIQUES
In some implementations, the techniques disclosed herein may include monitoring, by a robotic device, a physical space, the physical space having a portion of a datacenter. In addition, the techniques may include detecting, by the robotic device, a person within the physical space. The techniques ma...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In some implementations, the techniques disclosed herein may include monitoring, by a robotic device, a physical space, the physical space having a portion of a datacenter. In addition, the techniques may include detecting, by the robotic device, a person within the physical space. The techniques may include attempting to authenticate the detected person by an authentication process that includes: prompting, by the robotic device, the detected person to authenticate themselves; receiving, by the robotic device, an authentication credential from the detected person; and determining, by the robotic device, whether the authentication of the detected person has passed. Moreover, the techniques may include in accordance with a determination that the authentication of the detected person has failed, performing an action commensurate with the determination that the authentication has failed. |
---|